hackedteam/vector-applet

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
.gitignore
direct/JavaUpgrade.jnlp
direct/java-1.6.0_30.xml
direct/java-map-update.xml
direct/java-policy.sec
direct/jre-windows-i586-iftw-rv.exe
direct/makeapplet.sh
direct/makeapplet.vbs
direct/makeupgrade.vbs
twostage/Readme.txt
twostage/applets.pro
twostage/build.xml
twostage/build/classes-exploit/x/classes.ser
twostage/build/classes-exploit/x/pr
twostage/build/classes-exploit/x/puc
twostage/build/jar/x.jar
twostage/html/applet.demo.html
twostage/html/applet.html
twostage/lib/asm-all-3.3.1.jar
twostage/lib/proguard.jar
twostage/out.map
twostage/payloads/putty
twostage/server/applet/applet.html
twostage/server/applet/version
twostage/server/applet/zip.exe
twostage/src-exploit/x/bytes.ser
twostage/src-exploit/x/classes.ser
twostage/src-exploit/x/pr
twostage/src-exploit/x/puc
weaponized/Readme.txt
weaponized/applets.pro
weaponized/build.xml
weaponized/html/jarWeaponPayload.html
weaponized/lib/asm-all-3.3.1.jar
weaponized/lib/proguard.jar
weaponized/payloads/mac
weaponized/payloads/nomac
weaponized/payloads/nowin
weaponized/payloads/putty
weaponized/payloads/rcs
weaponized/payloads/win
weaponized/server/applet-w.zip
weaponized/server/applet-x.zip
weaponized/server/applet/applet.html
weaponized/server/applet/version
weaponized/server/applet/zip.exe
weaponized/src-exploit/x/input.xml
direct/WebEnhancer.java70
A
3 hrs
twostage/build/src-encoded/x/EC.java32
twostage/build/src-encoded/x/XAppletW.java163
D
1 day